Posts

How do special services work?! How do I stay anonymous?

Image
  Mobile phone is a sensor that constantly collects information regardless of the phone's operating mode. It is in standby or talk mode. Mobile operators log all your activities and store them for a certain period of time (at least 6 months). Thus, contact numbers, the full name of the owner, the duration of calls, the turning on and off of the phone, the content of SMS, the use of the Internet, movement, the use of different SIM cards and devices fall into the hands of operators. How do I stay anonymous? Refuse to use mobile operators or not at all. The fact is that all information about the SIM card is available to anyone for a certain amount. This means that by knowing your number or name, you can get a complete issue, including your current location and movement for the last 6 months. The operators' employees sell this information. At the end of the article, let's analyze what services are provided on shadow forums and how much it costs. And to begin with, let's und...

SQL Injections: Web Application Vulnerabilities and Methods of Attacking Databases via SQL Queries

Image
  SQL injections are one of the most common and dangerous vulnerabilities in web applications that can lead to serious consequences for data security. What is SQL Injection? SQL injection is a type of attack on web applications in which an attacker injects malicious SQL code into input fields or query parameters, allowing them to perform unwanted operations on the database. SQL injections occur due to insufficient server-side processing of user input. SQL injection works by inserting SQL code into a query string, which is then executed by the database. This SQL can be intentionally designed to modify or retrieve data from a database, bypass authorization, delete or modify tables, and more. Methods of attacking databases via SQL queries There are several common methods of attacking databases using SQL injection: Inserting malicious code: An attacker can insert SQL code directly into input fields on a web page, such as authentication forms, searches, or comments. URL injections: An a...

How to Enable Audio over Remote Desktop?

Image
      List of content you will read in this article:     1. How to enable audio in Windows Server via remote desktop protocol? [Complete Guide]     2. Conclusion:      3. FAQ The virtual nature of the Windows server does not allow you to play any audio by default. If you are thinking of connecting additional speakers to fulfill your purpose, then we are sorry to disappoint, but that won’t be helpful. To accomplish this task, proceed further to the article to enable audio in Windows server. You can redirect your VPS audio to your local computer system with the help of Remote Desktop Protocol. Now, let us move towards understanding the process of how to enable audio on Windows VPS Server.  How to enable audio in Windows Server via remote desktop protocol? [Complete Guide] Let us dive into implementing them on Windows Server 2016. To redirect your VPS audio to your local system, having a running Windows Audio Service...

How To Setup WireGuard VPN on Windows?

Image
    WireGuard is one of the best VPN protocols and is loved for its fast speed and ease of configuration. List of content you will read in this article:     1. Why WireGuard VPN?      2. How to Configure WireGuard VPN on Windows?     3. Conclusion      4. FAQ WireGuard   is one of the most popular VPN protocols today. It is an open-source VPN protocol that leverages cryptography tools to create a secure VPN tunnel. While several VPN protocols are available, WireGuard stands out for several reasons.   The protocol has incredible speed, making it   faster than   OpenVPN . WireGuard is also easy to deploy and configure. It can also maintain a connection even when the internet is unstable, thanks to its capability to keep working between   IP addresses.  Since WireGuard is implemented in a few code lines, it is small; hence easy to audit it for security vulnerabilities. The pr...